Building Scalable Web Apps on AWS

Join AWS for this Building Scalable Web Applications webinar where we will explain the key architectural patterns used to build applications in the AWS Cloud, and how to leverage cloud fundamentals to build highly available, cost effective web-scale applications.

You will learn how to design for elasticity and availability within AWS using a common web architecture as a reference point and discuss strategies for scaling, security, application management and global reach. If you want to know how to make your applications truly scale then join this webinar to learn more.

Amazon Web Services (AWS) offers a wide range of database options to fit your application requirements. From database services that are fully managed and that can be launched in minutes with just a few clicks to self-managed databases running on EC2. AWS managed database services include Amazon Relational Database Service (Amazon RDS), with support for six commonly used database engines, Amazon Aurora, a MySQL and PostgreSQL-compatible relational database, Amazon DynamoDB, a NoSQL database service or Amazon Redshift, a petabyte-scale data warehouse service. AWS also provides the AWS Database Migration Service, a service which makes it easy and inexpensive to migrate your databases to AWS cloud.

In this webinar, we take a closer look at the AWS database offerings and learn how to quickly select, set up, operate, and scale your database in the cloud.

Learning Objectives:

• Gain insights into the AWS database offering and know which to select for your workload.

In our first Windows webinar, find out about the benefits of migrating your Windows workloads to AWS. During the session, we will explain why AWS makes your Windows applications faster, more reliable and more secure. He will also talk about how to bring your own license (BYOL), how to architect, deploy, and manage your Windows platforms on AWS.

In this webinar, we will explain how running SQL Server on AWS gives you complete control over every setting, without the maintenance, backup and patching requirements of traditional on-site solutions. Learn how to provision and monitor your SQL Server databases in both Amazon RDS and Amazon EC2, and how to optimise scalability, performance, availability, security and disaster recovery.

Scaling IoT platforms to support production workloads can be difficult and time consuming. In this webinar, we’ll see how to design real-world IoT applications with a serverless back end. This kind of architecture can grow from very few to virtually unlimited users without any infrastructure or servers to manage. In particular, we’ll see an example of data collection from multiple IoT sensors, and how to process streaming data and present the results in a consolidated web dashboard.

Learning objectives:

- Learn how to implement data collection from IoT sensors using service such as AWS IoT
- Leverage the Amazon Kinesis platform to analyse streaming data
- Understand best practices to design a serverless architecture to process and consolidate results

AWS provides a range of security services and features that AWS customers can use to secure their content and applications and meet their own specific business requirements for security. This presentation focuses on how you can make use of AWS security features to meet your own organisation's security and compliance objectives.

Artificial Intelligence (AI) is enhancing many of the services that we interact with today. It can improve the customer experience of many services to make them more accessible, whilst providing information faster in a format that feels more natural.

AWS provides a collection of highly scalable, pre-trained and pre-tuned managed AI services that you can adopt without any previous artificial intelligence or deep learning knowledge. In this webinar, Steve explains how to implement each of these services to improve the user journey for a flight booking and check-in system.

The AWS solutions discussed here include Amazon Polly, which provides audio instructions for sight-impaired users and Amazon Rekognition, which provides an additional layer of security during the check-in process, matching users with customer data on file. Finally, Amazon Lex is used to enable customers to make future flight bookings using only their voices.

Learning objectives:

- Understand why you may wish to use AI in your applications today
- Identify the common AI challenges and practical use cases for Amazon AI services
- Implement Amazon AI services without a PhD or Data Science background

If you knew the state of everything in the world, and could apply logic on top of the data, what problems could you solve?

AWS IoT Services help you collect and send data to the cloud, make it easy to load and analyse that information, and provide the ability to manage your devices, so you can focus on developing applications that fit your needs.

Amazon Machine Learning is a service that makes it easy for developers of all skill levels to use machine learning technology. Amazon Machine Learning provides visualisation tools and wizards that guide you through the process of creating machine learning (ML) models without having to learn complex ML algorithms and technology.

In this webinar, Neeraj explains how you can use AWS IoT and Amazon Machine Learning together to build smart IoT applications. We will demonstrate how to setup Amazon Machine Learning, create and train Machine Learning models for your applications. We will then use these models in our IoT Applications, in real time.

Learning objectives:

- Understand why you may use Amazon Machine Learning with IoT and how to set it up.
- Understand how to use IoT Rules Engine

Whether it is per business unit or per application, many AWS customers use multiple accounts to meet their infrastructure isolation and billing requirements. In this session, we discuss considerations, limitations, and security patterns when building out a multi-account strategy. We explore topics such as identity federation, cross-account roles, consolidated logging, and account governance.

At the end of the session, we present an enterprise-ready, multi-account architecture that you can start leveraging today.

Security of big data workloads in a hybrid IT environment often comes as an afterthought. This session discusses how enterprises can architect secure, big-data workloads on AWS. We cover the application of authentication, authorization, encryption, and additional security principles and mechanisms to workloads leveraging Amazon Elastic MapReduce (EMR) and Amazon Redshift.

You have already started connecting your devices to AWS IoT. You can control them from the cloud. And you can collect, store and analyse data from all your devices in the cloud. So far so good, but you now need to build an architecture that will serve millions of users and devices concurrently.

In this session, Jan will explain how you can build a real world IoT architecture that serves millions of devices. The talk will focus on user and device onboarding, device and user access management, message exchange and end user access to live and historical data stored in the cloud.

Learning objectives:

- Learn simple steps to build a real-world IoT architecture that serves millions of devices
- Understand how to onboard and manage users and IoT devices and to access live and historial data in the cloud

IoT can give you great insight into consumer behaviour and demand, helping to you create the innovative, revenue-generating services of the future. However, there are still lots of challenges around collecting data from devices, which often have significant limitations in terms of processing power, memory and interfaces.

In this presentation, Danilo talks about how Amazon AI services can be used to augment device capabilities to make data collection, storage and analytics easier. He also considers how people can start interacting with machines in a more natural way, for example using natural language understanding (NLU), automatic speech recognition (ASR), visual search and image recognition, text-to-speech (TTS).

Learning objectives:

- Learn how to design IoT solutions using services such as AWS Greengrass and AWS IoT
- Gain insights into practical use cases for Amazon AI services
- Understand the possibilities of using AI from an IoT device

Does meeting stringent compliance requirements keep you up at night? Do you worry about having the right audit trails in place as proof?

In this session, you will learn why building security in from the beginning saves you time (and painful retrofits) later, how to gather and retain audit evidence for instances that are only up for minutes or hours, and how to meet many compliance requirements and ensured that Amazon EC2 instances are immediately protected as they come online.

Come to this session to learn how Europol, the Dutch police, Intel Security, and Kaspersky Lab have come together in an unprecedented collaboration of government and private-sector organizations. Open source ransomware code makes it easier to lock victims’ computers and encrypt their data, resulting in an alarming increase of cyber ransom. In response www.nomoreransom.org was created with the additional cooperation of AWS and Barracuda Web Application Firewall. Learn what tools are available to retrieve encrypted data and take a peek under the hood of this mission-critical website in the fight against ransomware. Perhaps because the site opposes ransomware, it has already received a number of attacks. Learn how AWS and Intel worked to rebuff these persistent assaults.

With security-relevant services such as AWS Config, VPC Flow Logs, Amazon CloudWatch Events, and AWS Lambda, you now have the ability to automatically respond to and process security events that may occur within your AWS environment. These including prevention, detection, response, and remediation. This session covers the process of automating security event response using various AWS building blocks, gaining confidence in your coverage by proactively testing security monitoring and response effectiveness before anyone else does.

With constantly evolving threats across the Internet, Harvard University deployed a security network platform to mitigate cyber threats, current and future, to protect institutional and research data. By using multiple geographic locations, best of breed equipment, and network automation, Harvard provides visibility, availability, and multilayer protections for their cloud network. This talk discusses the benefits, considerations, and lessons learned from using their security network platform at the edge of the cloud. Learn how Harvard designed and deployed the platform, utilizing serverless architecture to orchestrate the solution from within to protect their most sensitive data and afford students, faculty, and staff the flexibility of cloud computing.

In this session, you’ll learn how to setup your AWS environment to avoid a cyber security attack and how to build a cloud specific incident response plan if your organization is breached. Cyber security expert and founder of Alert Logic Misha Govshteyn will share lessons learned from organizations that have protected themselves in AWS and from those that have been breached but quickly resolved their issues and implemented strong controls as a result. Joining Misha will be Sven Skoog, Senior Manager IT Security at Monotype who will discuss the cyber security posture they implemented within the AWS cloud and how they have built a robust process to ensure ongoing protection. Session sponsored by Alert Logic.

This AWS Security Checklist webinar will help you and your auditors assess the security of your AWS environment in accordance with industry or regulatory standards. This security focused checklist builds on recently revised Operational Checklists for AWS, which helps you evaluate your applications against a list of best practices before deployment.

Learning Objectives:

- Evaluate the ability of AWS services to meet information security objectives and ensure future deployments within the AWS cloud are done in a secure and compliant way
- Assess your existing organisational use of AWS and to ensure it meets security best practices
- Develop AWS usage policies or validate that existing policies are being followed

Learn how you can help maintain control of your environment by choosing the right AWS security tools with this introductory webinar. We will show you how AWS Identity and Access Management (IAM), AWS Config Rules, and AWS Cloud Trail can help you maintain that control. You will discover how to track changes, monitor compliance, and keep an audit record of API requests.

Learning Objectives:

- Learn what IAM is and how to leverage it appropriately.
- Gain familiarity with how to track changes and monitor for compliance.
- Keep an audit record of API requests for reporting purposes.
- Understand how these services complement each other.